Rules File Certified

cursor-security-rules

Provides a Cursor rules file that enforces secure coding practices and controls AI agent operations through input validation, authentication checks, dependency management, and sensitive operation restrictions.

88

/ 100 · Grade B

B = 80–89

I need to enforce secure coding practices and control AI agent operations in my Cursor development environment to prevent security vulnerabilities and unauthorized actions.

securitydevelopment toolsai safetycode qualityaccess control
Publisher: matank001Version: latestCertified: Mar 29, 2026Expires: Mar 29, 2027Source ↗

cursor-security-rules earned Certified status with a trust score of 88/100 (Grade B). No adversarial findings — all attack patterns were handled gracefully. Security scan flagged 0 findings.


Trust Score Breakdown

Eight weighted signals composing the aggregate trust score

security scan
100% × 15w
15.0
supply chain
100% × 10w
10.0
adversarial
100% × 25w
25.0
provenance
80% × 20w
16.0
consumer confirm
100% × 10w
10.0
behavioral pass
100% × 10w
10.0
contract accuracy
33% × 6w
2.0
uptime
100% × 4w
4.0

Scheme v2.0 · Weights provisional · Consumer confirmations and uptime use pipeline-derived baselines.


Findings

Security scan results, adversarial testing, and pipeline review

Security Scan — Cisco Skill Scanner

cisco-skill-scannerFAIL
staticbehavioralllmmeta
critical: 0high: 0medium: 0low: 0

Adversarial Testing — 6 categories, 0 findings

prompt injection chainsprivilege escalationdata exfiltration side channelscapability squattingcontext poisoningdependency confusion

No adversarial findings — all attack patterns handled gracefully.

Methodology v1.0 · 6 categories · ~55 attack patterns


Behavioral Fingerprint

Runtime performance baseline for drift detection

Samples

8

Error rate

0.0%

Peak memory

— MB

Avg CPU

—%

Response time distribution

p50: 22371msp95: 32126msp99: 32126ms

Output size distribution

p50: 4.7 KBp95: 6.5 KBmean: 5.1 KB

Fingerprint v1.0 · Baseline: Mar 29, 2026 · Status: baseline


Interface

Skill triggers and instruction summary

Activation

This skill activates when providing security rules and guidelines for Cursor AI-assisted development environments.

This skill handles the provision of security rules, best practices, and guardrails for AI code generation in Cursor.

Instructions: 24Files: 1Format: markdown

Does

Provide security rules for Cursor development environments

Enforce safe coding practices through rule definitions

Prevent exposure of secrets in code generation

Control sensitive operations in AI-generated code

Promote security-first development culture

Does not

Generate unsafe code patterns

Expose secrets or sensitive information

Execute dangerous system commands

Bypass security guardrails


Scope & Permissions

What this capability can and cannot access — derived from pipeline analysis

creates files

no

deletes files

no

modifies files

no

accesses env variables

no

invokes external tools

no

makes network requests

no


Known Failure Modes

Documented edge cases and recovery behaviors

when when security rules are not properly implemented

then the agent provides guidance on correct rule implementation

when when unsafe code patterns are requested

then the agent refuses and suggests secure alternatives


Badge & Integration

Embed certification status in your README, docs, or CI pipeline

Fidensa Certified badge for cursor-security-rules
badge SVG →attestation API →integration guide →

Certification Notes

Provenance observations from the pipeline

content

Skill metadata extraction confidence is 75% — review extracted triggers, scope, and behavioral guarantees

publisher

Publisher "matank001" is not verified — first certification from this publisher

provenance

No SECURITY.md or SECURITY.txt file found — no published vulnerability reporting process

provenance

Single contributor — no peer review evidence in commit history

provenance

Package description appears to be boilerplate or template text


Signed Artifact

Certification provenance and verification metadata

Content hashsha256:34b4b8c886b77e66e6be2e17fa73ff30e227b0a1e0ac328a8425eecdebaacbb3
Key IDkms-9db4ed3b9f53
CertifiedMar 29, 2026
ExpiresMar 29, 2027
Pipeline version1.0
Statusvalid

cursor-security-rules — Certified (88/B) — Fidensa